0x4141414141 / Malware-DevlopmentLinks
Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C
☆39Updated 5 years ago
Alternatives and similar repositories for Malware-Devlopment
Users that are interested in Malware-Devlopment are comparing it to the libraries listed below
Sorting:
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Windows Administrator level Implant.☆49Updated 8 months ago
- Situational Awareness script to identify how and where to run implants☆52Updated 6 months ago
- IAT Unhooking proof-of-concept☆29Updated last year
- A small red team course☆40Updated 2 years ago
- ☆44Updated 3 weeks ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆48Updated last year
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated last year
- EvtPsst☆55Updated last year
- ☆55Updated 8 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- ☆38Updated 2 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 2 months ago
- Docker container for running CobaltStrike 4.10☆37Updated 9 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- in-process powershell runner for BRC4☆45Updated last year
- ☆27Updated 2 years ago
- ☆59Updated last year
- ☆41Updated 11 months ago
- A pure C version of SymProcAddress☆27Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 11 months ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆22Updated 2 years ago
- Construct the payload at runtime using an array of offsets☆63Updated last year
- ☆36Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- Windows Thread Pool Injection Havoc Implementation☆30Updated last year
- POC of GITHUB simple C2 in rust☆53Updated 5 months ago